NET代码保护和发牌制度,协助保护他们。
NET code protection and licensing system which assists developers in protecting their.
讨论了临界区代码保护、任务切换以及2407的软堆栈等问题。
The problem of the protection for critical code, task switch and the software stack of the 2407 are discussed.
因此,恶意主机环境下移动代码保护技术的研究具有重要的理论和现实意义并受到极大的重视。
So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.
卡巴斯基强调了其现有产品的安全是不处于危险之中,因为他们只是有泄漏的代码保护功能并不关心小部分。
Kaspersky stressed the security of its current products was not at risk because they only contained small parts of the leaked code which didn't concern protection functions.
这段代码接受来自用户的受感染数据,检查要打印的字符只有字母和数字字符以及空格符,以此来提供安全保护。
This piece of code takes up tainted data from the user, ensuring protection as it checks that the characters to be printed are only alphanumeric characters and Spaces.
它们也保护了您在代码上花费的心血,因为您可以在容器间移动应用程序的大部分。
They also protect your investment in code because you can move more of your application between containers.
如果在更高版本中继续沿用这一策略,样式表可能会遇到过时的保护代码问题。
If that policy were to continue into higher versions, your stylesheets might have problems with obsolete guarding code.
因此,要形成保护数据库的习惯,请尽可能避免使用动态SQL代码。
So, to form the habit of guarding your database, avoid dynamic SQL code as much as possible.
这包括若干安全增强,例如关闭脚本漏洞和欺骗保护。而且,大部分增强不会影响您的工作,除非您正打算编写恶意代码。
Several security enhancements are included, from closing script vulnerabilities to phishing protection, but most of them won't affect your work unless you happen to be writing malicious code.
UML到 C++的转换提供了一个以公共元素、被保护元素、私有元素这一顺序生成代码的选项。
The UML To C++ transformation provides an option to generate the code in the order of public elements, followed by protected and private, respectively.
此外,有些实现不支持跳板代码,因此可能必须对需要这种保护的程序禁用该特性。
Also, some implementations don't support trampolines, so the protection may have to be disabled for programs that need them.
它还在新代码和遗留代码之间提供一个保护层,以确保这两种类型的代码不致于对彼此造成不利影响。
It also provided a layer of protection between new and legacy code, ensuring the two types of code did not inappropriately affect one another.
借助于开源软件,这种代码就得到一种专门许可证的保护,确保人人都能使用这些代码。
With open source software, the code is protected by a special license that ensures everyone has access to that code.
它还能通过在通知方法中移除所需的保护代码,显著地减少所需代码的数量。
It can also significantly reduce the amount of code required, by removing the need for guard code in advice methods.
比如,为屏幕保护程序设置解锁代码并在接近电脑的时候吹一下口哨——再无需烦人的密码键入操作。
Set up an unlock code for your screensaver and whistle as you approach your desk — no more bothersome password typing.
保护自己免于恶意代码攻击的一种方法是确保接收到预期的输入。
One way to protect yourself from malicious code is to make sure that what you expect as input is actually what you receive as input.
这个新的8字节dif字段包括一个循环冗余代码(CRC)用以保护数据,一个参考标签用以保护数据免遭误导写入,以及一个应用程序标签。
The new 8-byte DIF field includes a cyclical redundancy code (CRC) to protect the data, a reference tag to protect against misdirected writes, and an application tag.
较新的JVM实现现在保护代码免遭此类安全隐患。
Newer implementations of the JVM now allow you to protect your code against the security implications of this effect.
这样将保护程序代码避免堆栈、缓冲区和函数指针溢出,而且全都不需重新编译。
This protects against stack, buffer, and function pointer overflows, all without recompilation.
Office加载程序的VisualStudio工具使用的默认设置不允许任何程序集运行,以保护用户免受病毒或其他恶意代码的侵害。
The default Settings used by the Visual Studio Tools for Office loader do not permit any assembly to run, which protects users from viruses and other malicious code.
清单15中的代码片段显示了AFS保护服务器(ptserver)以及afs卷位置服务器(vlserver)实例的创建。
The code snippet in Listing 15 shows creation of AFS protection server (ptserver) and AFS volume location server (vlserver) instances.
其它最新变化都是在RC2里面完成的,诸如“请求伪造保护”的改进和ActiveRecord连接池代码的调优。
Some last minute changes were done in RC2, namely the improvement of the request forgery protection and tuning of the ActiveRecord connection pooling code.
说明:Linux的程序代码受版权和许可证保护,但是操作系统主旨是避免与Unix的知识产权冲突。
Clarification: Linux's programming code retains copyright and licensing protections, but the operating system was designed to avoid conflicts with intellectual property rights associated with Unix.
首先,我们展示如何保护JTable的UI代码不因任何数据变化而遭到更改。
First, we'd like to show how we were able to protect the JTable's UI code from being altered by any data changes.
理想情况下,受保护的递增操作应该像清单5所示的那样,并且块中代码的含义和清单2的扩展形式相同。
Ideally, you'd like to be able to have your guarded increment operation look something like Listing 5 and have the code in the block mean the same as it would in the expanded form from Listing 2.
清单1.用ReentrantLock保护代码块。
关于获取访问代码的操作指南在MQLLM InformationCenter无保护简介部分可见。
Instructions on acquiring the access code are available in the unprotected introductory section of the MQ LLM Information Center.
SFLC发现使用WordPress版权代码的PHP文件受GPL保护,但主题的图片和CSS不在此列。
What the SFLC found is that while the PHP files that leverage WordPress 'copyrighted code are protected by the GPL, the images and CSS files of the themes are not.
另外,这些类使用com.ibm . resource . security . auth .resourcepermission类保护敏感代码。
In addition, these classes use the com.ibm.resource.security.auth.ResourcePermission class to protect sensitive code. For example, the Auction class has the following constructor.
一段时间之后,人们又想出了一种防止该问题的新思路:将所有可执行代码转移到一个称为“ASCII保护(asciiarmor)”区域的内存区。
After some time, a new idea was developed to counter that problem: move all executable code to an area of memory called the "ASCII armor" region.
应用推荐